首页> 外文期刊>IEEE Transactions on Computers >Hardware-Based Malware Detection Using Low-Level Architectural Features
【24h】

Hardware-Based Malware Detection Using Low-Level Architectural Features

机译:使用低级体系结构功能的基于硬件的恶意软件检测

获取原文
获取原文并翻译 | 示例

摘要

Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety and complexity of attacks continue to increase. In response, software-based malware detection tools have grown in complexity, thus making it computationally difficult to use them to protect systems in real-time. Therefore, software detectors are applied selectively and at a low frequency, creating opportunities for malware to remain undetected. In this paper, we propose Malware-Aware Processors (MAP) - processors augmented with a hardware-based online malware detector to serve as the first line of defense to differentiate malware from legitimate programs. The output of this detector helps the system prioritize how to apply more expensive software-based solutions. The always-on nature of MAP detector helps protect against intermittently operating malware. We explore the use of different features for classification and study both logistic regression and neural networks. We show that the detectors can achieve excellent performance, with little hardware overhead. We integrate the MAP implementation with an open-source x86-compatible core, synthesizing the resulting design to run on an FPGA.
机译:随着攻击种类和复杂性的不断增加,安全漏洞和随之而来的恶意软件对计算系统提出了越来越多的挑战。作为响应,基于软件的恶意软件检测工具变得越来越复杂,因此难以在计算上使用它们实时保护系统。因此,软件检测器被选择性地以低频应用,从而为恶意软件保持未被检测提供了机会。在本文中,我们提出了恶意软件感知处理器(MAP)-增强了基于硬件的在线恶意软件检测器的处理器,作为区分恶意软件与合法程序的第一道防线。该检测器的输出可帮助系统确定如何应用更昂贵的基于软件的解决方案。 MAP检测器的永远在线特性有助于防止间歇性运行的恶意软件。我们探索使用不同的功能进行分类,并研究逻辑回归和神经网络。我们证明了这些检测器可以实现出色的性能,而硬件开销却很小。我们将MAP实现与开放源代码的x86兼容内核集成在一起,从而合成了可以在FPGA上运行的设计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号